An All-in-One Solution for Securing Access to Applications and APIs on Pivotal Cloud Foundry

The Single Sign-On service provides support for native authentication, federated single sign-on, and authorization. Operators can configure native authentication and federated single sign-on, for example SAML, to verify the identities of application users. After authentication, the Single Sign-On service uses OAuth 2.0 to secure resources or APIs.

Single Sign-On handles identity from start to finish. The service translates complex interactions with your legacy systems into OAuth and OpenID compliant tokens for your applications and APIs to consume. From there, Single Sign-On configures frameworks such as Spring Boot and Steeltoe for .NET to automatically handle these tokens for you.

Watch

Single Sign-On Service for PCF 1.4 Demo

Single Sign-On
Overview

The Single Sign-On service allows users to log in through a single sign-on service and access other applications that are hosted or protected by the service. This improves security and productivity since users do not have to log in to individual applications. The service converts legacy identity protocols into modern cloud-native, federated protocols for your applications and APIs to consume. Developers using Spring Boot (for Java) or Steeltoe (for .NET) can accelerate development with identity that just works. Developers are responsible for selecting the authentication method for application users. They can select native authentication provided by the UAA or external identity providers.

Fully automated management of the service on Pivotal Cloud Foundry. Monitoring, failure recovery, and software updates with zero-to-minimal downtime.

Operators can customize plan definitions to support orgs, spaces, roles, and users.

The service is documented with instructions for setup and operation.

Leverages and extends the features and capabilities of Cloud Foundry’s User Account and Authentication (UAA) service.

“The Single Sign-On Service on PCF offers a turnkey solution that enables strong application security while easing user experience. This technology release is based on standards like OAuth, OpenID Connect, and SAML 2.0. Our objective is to offer developers a simplified experience while making it easy for operators to deploy, configure and maintain the service.”

Developers are responsible for selecting the authentication method for application users. They can select native authentication provided by the UAA or external identity providers.

After authentication, the Single Sign-On service uses OAuth 2.0 for authorization. OAuth 2.0 is an authorization framework that delegates access to applications to access resources on behalf of a resource owner.

Developers define resources required by an application bound to a Single Sign-On (SSO) service instance and administrators grant resource permissions.

Detailed installation guides are available for these identity management services: